New uranium leak found at Areva factory

By Reuters


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
French nuclear firm Areva has detected a uranium leak that could date back several years at a factory in southeastern France, the French safety authority said.

The nuclear watchdog of Europe's biggest atomic energy nation said it had dispatched a team of experts to check the site in Romans-sur-Isere, but did not give any indication about the size of the leak.

Areva, a state-controlled company which makes nuclear reactors and deals with uranium, said the leak was confined to its FBFC site and did not pose a danger to the environment.

"The defective pipe was shut by our teams," Areva said in a statement, adding that the pipe linked a workshop making fuel to a uranium treatment station.

News of the leak came the day after France ordered tests at all its 19 nuclear power plants following the discovery that liquid containing non-enriched uranium had been accidentally released from another Areva site in southeast France.

Areva told the nuclear safety authority ASN that the latest leak came from a buried pipe transporting liquid uranium and that the crack in the tubing was "several years old".

"Areva will start the cleaning of the impacted zone on July 18," the ASN said in a statement, adding that the pipes did not appear to meet safety regulations.

Areva said it would ask the ASN to classify the leak at level one of the International Nuclear Event Scale, used to measure the potential danger of incidents at nuclear sites. The scale has seven levels, the lowest of which is zero.

The ASN criticized Areva for the way it handled the previous leak at Tricastin, which was also classified as a level one event, saying it delayed communication of the problem and had unsatisfactory security measures in place.

Areva has since named a new manager for the Tricastin plant who has been told to review procedures at the site.

News of the latest incident is a fresh embarrassment for Areva which is at the forefront of French President Nicolas Sarkozy's effort to sell home-grown nuclear energy technology to the rest of the world.

The problems could also cast fresh doubts on France's recent decision to build a second new-generation European Pressurised Reactor (EPR) by 2017, bringing to 60 the number of nuclear reactors in France.

Related News

Switch from fossil fuels to electricity could cost $1.4 trillion, Canadian Gas Association warns

Canada Electrification Costs: report estimates $580B-$1.4T to scale renewable energy, wind, solar, and storage capacity to 2050, shifting from natural gas toward net-zero emissions and raising average household energy spending by $1,300-$3,200 annually.

 

Key Points

Projected national expense to expand renewables and electrify energy systems by 2050, impacting household energy bills.

✅ $580B-$1.4T forecast for 2020-2050 energy transition

✅ 278-422 GW wind, solar, storage capacity by 2050

✅ Household costs up $1,300-$3,200 per year on average

 

The Canadian Gas Association says building renewable electricity capacity to replace just half of Canada's current fossil fuel-generated energy, a shift with significant policy implications for grids across provinces, could increase national costs by as much as $1.4 trillion over the next 30 years.

In a report, it contends, echoing an IEA report on net-zero, that growing electricity's contribution to Canada's energy mix from its current 19 per cent to about 60 per cent, a step critical to meeting climate pledges that policymakers emphasize, will require an expansion from 141 gigawatts today to between 278 and 422 GW of renewable wind, solar and storage capacity by 2050.

It says that will increase national energy costs by between $580 billion and $1.4 trillion between 2020 and 2050, a projection consistent with recent reports of higher electricity prices in Alberta amid policy shifts, translating into an average increase in Canadian household spending of $1,300 to $3,200 per year.

The study, prepared by consulting firm ICF for the association, assumes electrification begins in 2020 and is applied in all feasible applications by 2050, with investments in the electricity system, guided by the implications of decarbonizing the grid for reliability and cost, proceeding as existing natural gas and electric end use equipment reaches normal end of life.

Association CEO Tim Egan says the numbers are "pretty daunting" and support the integration of natural gas with electric, amid Canada's race to net-zero commitments, instead of using an electric-only option as the most cost-efficient way for Canada to reach environmental policy goals.

But Keith Stewart, senior energy strategist with Greenpeace Canada, says scientists are calling for the world to get to net-zero emissions by 2050, and Canada's net-zero by 2050 target underscores that urgency to avoid "catastrophic" levels of warming, so investing in natural gas infrastructure to then shut it down seems a "very expensive option."

 

Related News

View more

Current Model For Storing Nuclear Waste Is Incomplete

Nuclear Waste Corrosion accelerates as stainless steel, glass, and ceramics interact in aqueous conditions, driving localized corrosion in repositories like Yucca Mountain, according to Nature Materials research on high-level radioactive waste storage.

 

Key Points

Degradation of waste forms and canisters from water-driven chemistry, causing accelerated, localized corrosion in storage.

✅ Stainless steel-glass contact triggers severe localized attack

✅ Ceramics and steel co-corrosion observed under aqueous conditions

✅ Yucca Mountain-like chemistry accelerates waste form degradation

 

The materials the United States and other countries plan to use to store high-level nuclear waste, even as utilities expand carbon-free electricity portfolios, will likely degrade faster than anyone previously knew because of the way those materials interact, new research shows.

The findings, published today in the journal Nature Materials (https://www.nature.com/articles/s41563-019-0579-x), show that corrosion of nuclear waste storage materials accelerates because of changes in the chemistry of the nuclear waste solution, and because of the way the materials interact with one another.

"This indicates that the current models may not be sufficient to keep this waste safely stored," said Xiaolei Guo, lead author of the study and deputy director of Ohio State's Center for Performance and Design of Nuclear Waste Forms and Containers, part of the university's College of Engineering. "And it shows that we need to develop a new model for storing nuclear waste."

Beyond waste storage, options like carbon capture technologies are being explored to reduce atmospheric CO2 alongside nuclear energy.

The team's research focused on storage materials for high-level nuclear waste -- primarily defense waste, the legacy of past nuclear arms production. The waste is highly radioactive. While some types of the waste have half-lives of about 30 years, others -- for example, plutonium -- have a half-life that can be tens of thousands of years. The half-life of a radioactive element is the time needed for half of the material to decay.

The United States currently has no disposal site for that waste; according to the U.S. General Accountability Office, it is typically stored near the nuclear power plants where it is produced. A permanent site has been proposed for Yucca Mountain in Nevada, though plans have stalled. Countries around the world have debated the best way to deal with nuclear waste; only one, Finland, has started construction on a long-term repository for high-level nuclear waste.

But the long-term plan for high-level defense waste disposal and storage around the globe is largely the same, even as the U.S. works to sustain nuclear power for decarbonization efforts. It involves mixing the nuclear waste with other materials to form glass or ceramics, and then encasing those pieces of glass or ceramics -- now radioactive -- inside metallic canisters. The canisters then would be buried deep underground in a repository to isolate it.

At the generation level, regulators are advancing EPA power plant rules on carbon capture to curb emissions while nuclear waste strategies evolve.

In this study, the researchers found that when exposed to an aqueous environment, glass and ceramics interact with stainless steel to accelerate corrosion, especially of the glass and ceramic materials holding nuclear waste.

In parallel, the electrical grid's reliance on SF6 insulating gas has raised warming concerns across Europe.

The study qualitatively measured the difference between accelerated corrosion and natural corrosion of the storage materials. Guo called it "severe."

"In the real-life scenario, the glass or ceramic waste forms would be in close contact with stainless steel canisters. Under specific conditions, the corrosion of stainless steel will go crazy," he said. "It creates a super-aggressive environment that can corrode surrounding materials."

To analyze corrosion, the research team pressed glass or ceramic "waste forms" -- the shapes into which nuclear waste is encapsulated -- against stainless steel and immersed them in solutions for up to 30 days, under conditions that simulate those under Yucca Mountain, the proposed nuclear waste repository.

Those experiments showed that when glass and stainless steel were pressed against one another, stainless steel corrosion was "severe" and "localized," according to the study. The researchers also noted cracks and enhanced corrosion on the parts of the glass that had been in contact with stainless steel.

Part of the problem lies in the Periodic Table. Stainless steel is made primarily of iron mixed with other elements, including nickel and chromium. Iron has a chemical affinity for silicon, which is a key element of glass.

The experiments also showed that when ceramics -- another potential holder for nuclear waste -- were pressed against stainless steel under conditions that mimicked those beneath Yucca Mountain, both the ceramics and stainless steel corroded in a "severe localized" way.

Other Ohio State researchers involved in this study include Gopal Viswanathan, Tianshu Li and Gerald Frankel.

This work was funded in part by the U.S. Department of Energy Office of Science.

Meanwhile, U.S. monitoring shows potent greenhouse gas declines confirming the impact of control efforts across the energy sector.

 

Related News

View more

Seven small UK energy suppliers must pay renewables fees or risk losing licence

Ofgem Renewables Obligations drive supplier payments for renewables fees, feed-in tariffs, and renewable generation, with non-payment risking supply licences amid the price cap and volatile wholesale prices across the UK energy market.

 

Key Points

Mandatory payments by suppliers funding renewables via feed-in tariffs; non-payment can trigger supply licence revoking.

✅ Covers Renewables Obligation and Feed-in Tariff scheme compliance.

✅ Non-payment can lead to Ofgem action and licence loss.

✅ Affected by price cap and wholesale price volatility.

 

Seven small British energy suppliers owe a total of 34 million pounds ($43.74 million) in renewables fees, amid a renewables backlog that has stalled projects, and could face losing their supply licences if they cannot pay, energy regulator Ofgem reports.

Under Britain’s energy market rules, suppliers of energy must meet so-called renewables obligations and feed-in tariffs, including households' ability to sell solar power back to energy firms, which are imposed on them by the government to help fund renewable power generation.

Several small energy companies have gone bust over the past two years, a trend echoed by findings from a global utility study on renewable priorities, as they struggled to pay the renewables fees and as their profits were affected by a price cap on the most commonly used tariffs and fluctuating wholesale prices, even as a 10 GW contract brings new renewable capacity onto the UK grid.

Ofgem has called on the companies to make necessary payments by Oct. 31, as moves to offer community-generated power to all UK customers progress.

“If they do not pay Ofgem could start the process of revoking their licences to supply energy,” it said in a statement, as offshore wind power continues to scale nationwide.

The seven suppliers are, amid debates over clean energy impacts, Co-Operative Energy Limited; Flow Energy Limited; MA Energy Limited; Nabuh Energy Limited; Robin Hood Energy Limited; Symbio Energy Limited and Tonik Energy Limited. ($1 = 0.7773 pounds)

 

Related News

View more

Neste increases the use of wind power at its Finnish production sites to nearly 30%

Neste wind power agreement boosts renewable electricity in Finland, partnering with Ilmatar and Fortum to supply Porvoo and Naantali sites, cutting Scope 2 emissions and advancing a 2035 carbon-neutral production target via long-term PPAs.

 

Key Points

A PPA to source wind power for sites, cutting Scope 2 emissions and supporting Neste's 2035 carbon-neutral goal.

✅ 10-year PPA with Ilmatar; + Fortum boosts renewable electricity share.

✅ Supplies ~7% of Porvoo-Naantali electricity; capacity >20 MW.

✅ Cuts Scope 2 emissions by ~55 kt CO2e per year toward 2035 neutrality.

 

Neste is committed to reaching carbon neutral production by 2035, mirroring efforts such as Olympus 100% renewable electricity commitments across industry.

As part of this effort, the company is increasing the use of renewable electricity at its production sites in Finland, reflecting trends such as Ireland's green electricity targets across Europe, and has signed a wind power agreement with Ilmatar, a wind power company. The agreement has been made together with Borealis, Neste's long-term partner in the Kilpilahti area in Porvoo, Finland.

As a result of the agreement with Ilmatar, as well as that signed with Fortum at the end of 2019, and in line with global growth such as Enel's 450 MW wind project in the U.S., nearly 30% of the energy used at Neste's production sites in Porvoo and Naantali will be renewable wind power in 2022.

'Neste's purpose is to create a healthier planet for our children. Our two climate commitments play an important role in living up to this ambition, and one of them is to reach carbon neutral production by 2035. It is an enormous challenge and requires several concrete measures and investments, including innovations like offshore green hydrogen initiatives. Wind power, including advances like UK offshore wind projects, is one of the over 70 measures we have identified to reduce our production's greenhouse gas emissions,' Neste's President and CEO Peter Vanacker says.

With the ten year contract, Neste is committed to purchase about one-third of the production of Ilmatar's two wind farms, reflecting broader market moves such as BC Hydro wind deals in Canada. The total capacity of the agreement is more than 20 MW, and the energy produced will correspond to around 7% of the electricity consumption at Neste's sites in Porvoo and Naantali. The wind power deliveries are expected to begin in 2022.

The two wind power agreements help Neste to reduce the indirect greenhouse gas emissions (Scope 2 emissions defined by the Greenhouse Gas Protocol) of electricity purchases at its Finnish production sites, a trend mirrored by Dutch green electricity growth across Europe, annually by approximately 55 kilotons. 55 kt/a CO2e equals annual carbon footprint of more than 8,500 EU citizens.

 

Related News

View more

Pandemic causes drop in electricity demand across the province: Manitoba Hydro

Manitoba Electricity Demand Drop reflects COVID-19 effects, lowering peak demand about 6% as businesses and offices close, impacting the regional grid; recession-like patterns emerge while Winnipeg water consumption stays steady and peak usage shifts later.

 

Key Points

An observed 6% decline in Manitoba peak electricity during COVID-19 due to closures; Winnipeg water use remains steady.

✅ Daily peak load down roughly 6% provincewide

✅ Business and office shutdowns drive lower consumption

✅ Winnipeg peak water time shifts to 9 a.m., volume steady

 

The COVID-19 pandemic has caused a drop in the electricity demand across the province, according to Manitoba Hydro, mirroring the Ontario electricity usage decline reported elsewhere in Canada.

On Tuesday, Manitoba Hydro said it has tracked overall electrical use, which includes houses, farms and businesses both large and small, while also cautioning customers about pandemic-related scam calls in recent weeks.

Hydro said it has seen about a six per cent reduction in the daily peak electricity demand, adding this is due to the many businesses and downtown offices which are temporarily closed, even as residential electricity use has increased in many regions.


"Currently, the impact on Manitoba electricity demand appears to be consistent with what we saw during the 2008 recession," Bruce Owen, the media relations officer for Manitoba Hydro, noting a similar Ottawa demand decline during the pandemic, said in an email to CTV News.

Owen added this trend of reduced electricity demand is being seen across North America, with BC Hydro pandemic load patterns reported and the regional grid in the American Midwest – an area where Manitoba Hydro is a member.

While electricity demand is down, BC Hydro expects holiday usage to rise and water usage in Winnipeg has remained the same.

The City of Winnipeg said it has not seen any change in overall water consumption, but as Hydro One kept peak rates in Ontario, peak demand times have moved from 7 – 8 a.m. to 9 a.m.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.